OTTx: Transações de Uso Único para Serviços Blockchain
Resumo
Em redes de negócios empresariais, a troca segura de informações entre organizações com objetivos diversos é comum. Usuários, identificados de forma única, acessam recursos por meio de aplicativos confiáveis. A integração de aplicativos de organizações externas introduz elementos não confiáveis e requer mecanismos para garantir privacidade, integridade e não repúdio. Este trabalho propõe um protocolo de Transações Únicas (OTTx) em Blockchains. Ele aborda a necessidade de autenticação segura de transações, revisa o estado da arte e avalia o OTTx em uma Blockchain permissionada. Os resultados mostram que o OTTx garante segurança, privacidade, integridade e não repúdio para transações envolvendo identidades externas, com desempenho satisfatório e baixa sobrecarga de rede. Esta contribuição avança o conhecimento em Blockchains, fornecendo uma solução eficaz para transações envolvendo participantes de rede não confiáveis.Referências
Satoshi Nakamoto, ”Bitcoin: A Peer-to-Peer Electronic Cash System,”March 2009. Available at: [link].
A.-D Liu, X.-H Du, N. Wang, S.-Z Li, ”Research Progress of Blockchain Technology and Its Application in Information Security,”Journal of Software, vol. 29, pp. 2092-2115, July 2018. DOI: 10.13328/j.cnki.jos.005589.
Shrivas, M. K., Yeboah, T. (2019). ”The disruptive blockchain: types, platforms, and applications.”Texila International Journal of Academic Research, 3, 17-39.
Leslie Lamport, ”Password Authentication with Insecure Communication,”Communications of the ACM, vol. 24, no. 11, pp. 770–772, November 1981. DOI: 10.1145/358790.358797.
Woo-Suk Park, Dong-Yeop Hwang, Ki-Hyung Kim, ”A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain,”in Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018. DOI: 10.1109/ICUFN.2018.8436784.
Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang, ”An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology,”in Proceedings of the 2018 IEEE International Conference on Communications (ICC), 2018. DOI: 10.1109/ICC.2018.8422733.
Mingli Zhang, Liming Wang, Jing Yang, ”A Blockchain-Based Authentication Method with One-Time Password,”in Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019. DOI: 10.1109/IPCCC47392.2019.8958754.
Alessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari, ”A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication,”in Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), 2021. DOI: 10.1109/ISCC53001.2021.9631479.
Christian Cachin et al., ”Architecture of the Hyperledger Blockchain Fabric,”in Proceedings of the Workshop on distributed cryptocurrencies and consensus ledgers, Chicago, IL, 2016.
Elli Androulaki et al., ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,”Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, Porto, Portugal, 2018. DOI: 10.1145/3190508.3190538.
Gustavus J. Simmons, ”Symmetric and asymmetric encryption,”ACM Computing Surveys (CSUR), vol. 11, no. 4, pp. 305-330, 1979.
Chang-Seop Park, ”One-time password based on hash chain without shared secret and re-registration,”Computers and Security, 2018. DOI: 10.1016/j.cose.2018.02.010.
Quynh H. Dang, ”Secure hash standard,”Quynh H. Dang, 2015.
Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, ”A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption,”Future Generation Computer Systems, 2021. DOI: 10.1016/j.future.2021.06.050.
Rolf Oppliger, ”SSL and TLS: Theory and Practice,”Artech House, 2016.
A.-D Liu, X.-H Du, N. Wang, S.-Z Li, ”Research Progress of Blockchain Technology and Its Application in Information Security,”Journal of Software, vol. 29, pp. 2092-2115, July 2018. DOI: 10.13328/j.cnki.jos.005589.
Shrivas, M. K., Yeboah, T. (2019). ”The disruptive blockchain: types, platforms, and applications.”Texila International Journal of Academic Research, 3, 17-39.
Leslie Lamport, ”Password Authentication with Insecure Communication,”Communications of the ACM, vol. 24, no. 11, pp. 770–772, November 1981. DOI: 10.1145/358790.358797.
Woo-Suk Park, Dong-Yeop Hwang, Ki-Hyung Kim, ”A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain,”in Proceedings of the 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), 2018. DOI: 10.1109/ICUFN.2018.8436784.
Peggy Joy Lu, Lo-Yao Yeh, Jiun-Long Huang, ”An Privacy-Preserving Cross-Organizational Authentication/Authorization/Accounting System Using Blockchain Technology,”in Proceedings of the 2018 IEEE International Conference on Communications (ICC), 2018. DOI: 10.1109/ICC.2018.8422733.
Mingli Zhang, Liming Wang, Jing Yang, ”A Blockchain-Based Authentication Method with One-Time Password,”in Proceedings of the 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC), 2019. DOI: 10.1109/IPCCC47392.2019.8958754.
Alessio Catalfamo, Armando Ruggeri, Antonio Celesti, Maria Fazio, Massimo Villari, ”A Microservices and Blockchain Based One Time Password (MBB-OTP) Protocol for Security-Enhanced Authentication,”in Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), 2021. DOI: 10.1109/ISCC53001.2021.9631479.
Christian Cachin et al., ”Architecture of the Hyperledger Blockchain Fabric,”in Proceedings of the Workshop on distributed cryptocurrencies and consensus ledgers, Chicago, IL, 2016.
Elli Androulaki et al., ”Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains,”Proceedings of the Thirteenth EuroSys Conference, EuroSys ’18, Porto, Portugal, 2018. DOI: 10.1145/3190508.3190538.
Gustavus J. Simmons, ”Symmetric and asymmetric encryption,”ACM Computing Surveys (CSUR), vol. 11, no. 4, pp. 305-330, 1979.
Chang-Seop Park, ”One-time password based on hash chain without shared secret and re-registration,”Computers and Security, 2018. DOI: 10.1016/j.cose.2018.02.010.
Quynh H. Dang, ”Secure hash standard,”Quynh H. Dang, 2015.
Devrim Unal, Abdulla Al-Ali, Ferhat Ozgur Catak, Mohammad Hammoudeh, ”A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption,”Future Generation Computer Systems, 2021. DOI: 10.1016/j.future.2021.06.050.
Rolf Oppliger, ”SSL and TLS: Theory and Practice,”Artech House, 2016.
Publicado
20/05/2024
Como Citar
DEFRÉMONT, André; PINHEIRO, Billy Anderson; VELOSO, Alan; ARAUJO, Roberto Samarone; ABELEM, Antônio Jorge.
OTTx: Transações de Uso Único para Serviços Blockchain. In: SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 42. , 2024, Niterói/RJ.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2024
.
p. 1134-1147.
ISSN 2177-9384.
DOI: https://doi.org/10.5753/sbrc.2024.1552.